Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 248 | 2014 |
Neural machine translation inspired binary code similarity comparison beyond function pairs F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019 | 198 | 2019 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017 | 108 | 2017 |
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis K Redmond, L Luo, Q Zeng The NDSS Workshop on Binary Analysis Research (BAR), 2019 | 52 | 2019 |
Touch well before use: Intuitive and secure authentication for iot devices X Li, F Yan, F Zuo, Q Zeng, L Luo The 25th annual international conference on mobile computing and networking …, 2019 | 46 | 2019 |
Repackage-proofing Android Apps L Luo, Y Fu, D Wu, S Zhu, P Liu Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016 | 44 | 2016 |
A multiversion programming inspired approach to detecting audio adversarial examples Q Zeng, J Su, C Fu, G Kayas, L Luo Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019 | 41 | 2019 |
T2pair: Secure and usable pairing for heterogeneous iot devices X Li, Q Zeng, L Luo, T Luo Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020 | 40 | 2020 |
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 39* | 2017 |
Resilient decentralized android application repackaging detection using logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li Proceedings of the 2018 International Symposium on Code Generation and …, 2018 | 38 | 2018 |
Integrating BIMserver and OpenStudio for energy efficient building N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen Computing in Civil Engineering (2013), 516-523, 2013 | 32 | 2013 |
Pfirewall: Semantics-aware customizable data flow control for home automation systems H Chi, Q Zeng, X Du, L Luo arXiv preprint arXiv:1910.07987, 2019 | 28 | 2019 |
Solminer: mining distinct solutions in programs L Luo, Q Zeng Proceedings of the 38th International Conference on Software Engineering …, 2016 | 21 | 2016 |
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019 | 14 | 2019 |
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019 | 14 | 2019 |
Exploiting the inherent limitation of l0 adversarial examples F Zuo, B Yang, X Li, Q Zeng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 13* | 2019 |
Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on iot cloud platforms L Luo, Q Zeng, B Yang, F Zuo, J Wang Annual Computer Security Applications Conference, 982-995, 2021 | 12 | 2021 |
PFirewall: Semantics-aware customizable data flow control for smart home privacy protection H Chi, Q Zeng, X Du, L Luo arXiv preprint arXiv:2101.10522, 2021 | 11 | 2021 |
Heap memory snapshot assisted program analysis for android permission specification L Luo 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 7 | 2020 |
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding Q Zeng, G Kayas, E Mohammed, L Luo, X Du, J Rhee Proceedings of the 49th Annual IEEE/IFIP International Conference on …, 2019 | 7* | 2019 |